General

  • Target

    9e0feffcc8433c7ca8830a7a29bae57b_JaffaCakes118

  • Size

    188KB

  • Sample

    240611-nwct7awajc

  • MD5

    9e0feffcc8433c7ca8830a7a29bae57b

  • SHA1

    20df51709b993487c6ce12357dc536fdd247b3f4

  • SHA256

    e5d9bb556a385de29f04eccbf388a0e8f73f556394bfcaff0a6c7ffb15e85a48

  • SHA512

    32b784c6a1e53020c11b68f7e7394c35d5a12acb3177aa89357dd9ccc0b945566fdd77bff4814c03725d506c144c67e6d3114ffc42fec77cc414a9e051ca392a

  • SSDEEP

    1536:rrdi1Ir77zOH98Wj2gpngt+a9UG37MgT7TxZk5tBRt9k6Y+g:rrfrzOH98ipgtrMgT3ytHt9ZY+g

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://geisterhouse.com/cgi-bin/LAb1/

exe.dropper

http://amyemitchell.com/themes/w/

exe.dropper

http://forestanalytics.net/images/57A7/

exe.dropper

https://konican.com/cgi-bin/cWu/

exe.dropper

http://strike3productions.com/squad/3aV6xrH/

exe.dropper

http://riandutra.com/img/wOMENgh/

exe.dropper

http://justinscott.com.au/sites/rRS/

Targets

    • Target

      9e0feffcc8433c7ca8830a7a29bae57b_JaffaCakes118

    • Size

      188KB

    • MD5

      9e0feffcc8433c7ca8830a7a29bae57b

    • SHA1

      20df51709b993487c6ce12357dc536fdd247b3f4

    • SHA256

      e5d9bb556a385de29f04eccbf388a0e8f73f556394bfcaff0a6c7ffb15e85a48

    • SHA512

      32b784c6a1e53020c11b68f7e7394c35d5a12acb3177aa89357dd9ccc0b945566fdd77bff4814c03725d506c144c67e6d3114ffc42fec77cc414a9e051ca392a

    • SSDEEP

      1536:rrdi1Ir77zOH98Wj2gpngt+a9UG37MgT7TxZk5tBRt9k6Y+g:rrfrzOH98ipgtrMgT3ytHt9ZY+g

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks